avatar

Michiel Kalkman

Software | Security | Product | Design

Notes and observations

OSCAL model relationships

Audit and compliance cost

Rapid technical assessment

Codebase evaluation checklist

Exploring team scalability

Leadership aspects

Binary reversing approaches

git flow sample

Architecture concerns

Modeling co-tenant risk for cloud services

DNSSEC components

Various network-based crypto sequences

DES Cipher visualisations

Skill tree and matrix example

Intel/AMD virtualization isolation and containment

Remote API checklist

Visibility maturity

Pipeline visualizations

Failure rates in multi-step, manual sequences

CCSP study notes